LSB Based Audio Steganography Based On Text Compression

Size: px
Start display at page:

Download "LSB Based Audio Steganography Based On Text Compression"

Transcription

1 Available online at Procedia Engineering 30 (2012) International Conference on Communication Technology and System Design 2011 LSB Based Audio Steganography Based On Text Compression M.Baritha Begum a,y.venkataramani b, a* a Saranathan College of Engineering Trichy ,India b Saranathan College of Engineering, Trichy, , Inidia Abstract Compression algorithm is what reduces the redundancy of data representation and decreases the data storage capacity. Data compression plays a vital role in reducing the communication cost making use of available bandwidth. The compressed data from the security aspect is transmitted through internet. It is, however very much vulnerable to a multitude of attacks. To propose a new dictionary based text compression technique for ASCII texts for the purpose of obtaining good performance on various document sizes. Dictionary based compression bits are hidden into the Lsb bit of audio signals and to calculate the signal to noise ratio (SNR). This audio Steganography is conducted for various compression algorithms with dictionary based compression. Audio Steganography based dictionary compression achieves better value of signal to noise ratio (SNR) Published by Elsevier Ltd. Selection and/or peer-review under responsibility of ICCTSD 2011 Open access under CC BY-NC-ND license. Keywords: Data compression; Dictionary Based Encoding (DBE); Lossless;Audio steganography;least significant bit(lsb). 1. Introduction Compression is the combination of two components. One is encoding algorithm, another one is decoding algorithm. In encoding algorithm makes the message as compressed representation. In decoding algorithm reconstructs the message from compressed representation to original message or it reconstructs some approximation. Compression algorithms are classified into two categories lossless algorithms reconstruct original message from compressed message. Lossless compression is used for text; loss compression is used for images and sound. [1, 3] Text compression is one approach to increase the performance of text compression. Input text can be changed a highly redundant text by using pre-defined highly redundant codes instead of words or phrases. This high redundant text will increase the performance of the text compression algorithm. The already existing arithmetic coding, * Baritha Begum. Tel.: ; address: baritha_m@yahoo.com Published by Elsevier Ltd. doi: /j.proeng Open access under CC BY-NC-ND license.

2 704 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) Huffman coding, LZ algorithm, PPMC, RLE cannot give better compression ratios. [4, 5] Better compression ratio is achieved by using dictionary based compression. Steganography, from the Greek, means covered or secret writing, and is a long-practiced form of hiding information. Although related to cryptography, they are not the same. Steganography intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood. More precisely, the goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present. Steganography includes a vast array of techniques for hiding messages in a variety of media. Among these methods are invisible inks, microdots, digital signatures, covert channels and spread-spectrum communications. Today, thanks to modern technology, steganography is used on text, images, sound, signals, and more. Cover is an audio, image, video so on which is used to hide the original message. The cover signal used in the system of steganography is called the host signals. Information hidden in cover data is called embedded data. [6, 7] There is no necessary to encrypt the hidden message.but it depends on the security of the system, the design of the complete knowledge of it. The advantage of steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered. Often, using encryption might identify the sender or receiver as somebody with something to hide. [8] 1.1. Background Of Text Compression And Steganography Lossless compression researchers have developed highly sophisticated approaches, such as Huffman encoding, arithmetic encoding, the Lempel-Ziv (LZ) family, Dynamic Markov Compression (DMC), Prediction by Partial Matching (PPM),Run length coding(rle) and Burrows-Wheeler Transform (BWT) based algorithms.[5,12,14] However, none of these methods has been able to reach the theoretical best-case compression ratio consistently. Dictionary Based Encoding (DBE) approach for trying to attain better compression ratios is to develop new compression algorithms. In order to increase the secrecy of the text message compressed by dictionary based compression, it is hidden in the audio file. If the text message is hidden using stenographic system, it may be detected by attackers. To avoid this, the input message may be converted into highly redundant code and then hidden.this method will help maintain secrecy. 2. Dictionary making algorithms 1. Calgary corpus files are taken as test text files. 2. Words are collected from all text files. This is 6, 18,108 number of words. 3. In this word, letters in uppercase are converted into letters in lowercase. 4. To form the dictionary, words are listed in descending order after finding how many times each word occurs words have been listed in the latest dictionary 6. For the first 169 words, single ASCII character is assigned as code. 7. For the words from 170 to 4300, single 169ASCII character with each uppercase letter is assigned as double codes. 8. For the remaining words, with each upper case letter previous two character combination is coded. Hiding the compressed text in audio will enhance the security. Compared to other text compression algorithm dictionary based audio steganography system gives better value.

3 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) LSB Insertion method 1. Audio file is converted into the data samples. 2. First 40 bytes are allocated for header part. 3. The compressed text message is converted as binary. 4. The length of text message is also converted as binary. 5. The identifier is selected to hide the text message. 6. An identifier helps in the recovery of text. 7. If there is no identifier in audio file, audio file no hidden text message. 8. The identifier s binary is Identifier can be hidden in 8 data samples. 10. The next 10 data samples will serve as the length of text message. 11. The next 10 data samples will be as the width of text message. 12. The compressed text message in the remaining data samples lsb is to be hidden Data Extraction Process 1. Text can be recovered in a reverse way of how the text is hidden. 2. Now check the received audio file whether identifier present or not. 3. Without identifier, there can be no hidden text in data samples. 4. Both the length and width of the text message from the data samples lsb are to be measured. 5. The lsb bit of data samples should be taken until the length of the message is received 6. Then the message in the lsb bit is to be converted into text. Decoding Algorithm The decoding is easier than the encoding. Upper case letters followed by single ASCII character is identified as a code. If upper case letters are followed by two ASCII characters, the second ASII character is identified as separate code. Extracted code is compared with dictionary table and corresponding words are collected in the output file. This output file after processing looks the same as the initial document since the compression and decompression is lossless. 3. Performance Analysis We made experiments on the transformation algorithms mentioned in section 2 using standard Calgary Corpus [15] text file collections.

4 706 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) Table1. List of files used in experiments File name Size(byte) Description Bib 111,261 Bibliography Geo 102,400 Geological seismic data Obj1 21,504 VAX object program paper1 53,161 Technical Paper Paper2 82,199 Technical Paper Paper3 46,526 Technical Paper Paper4 13,286 Technical Paper Paper5 11,954 Technical Paper Paper Technical Paper Progc 39,611 Source Code in C Progl 71,646 Source Code in Pascal Progp 49,379 Text: English Text The performance issue such as compression ratio and Bits per Character (BPC) are compared for the five cases i.e., simple Arithmetic coding, Huffman with BWT, LZSS with BWT and Dictionary based Encoding (DBE) The results are shown graphically and prove that DBE out performs all other techniques in compression ratio, Bits per Character (BPC). Output file size Compression ratio = Input file size Output file size Bits per character (BPC) = * 8 Input file size

5 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) Table.2: BPC comparison of transform Arithmetic coding, Huffman with BWT, LZSS with BWT and Dictionary based Encoding (DBE) for Calgary corpus files. File Name Arithmetic coding Huffman BWT LZSS BWT dictionary based compression Bib Geo Obj paper Paper Paper Paper Paper Paper Progc Progl Progp Fig.1: BPC comparison of transform Arithmetic coding, Huffman with BWT, LZSS with BWT, Dictionary based Encoding (DBE) for Calgary corpus files Comparision of Bits Per Character BPC Arithmetic coding Huffman BWT LZSS BWT dictionary based compression bib geo Obj1 paper1 Paper2 Paper3 Paper4 Paper5 Paper6 progc progl progp File Name Fig.2 compression ratio comparison of transform Arithmetic coding, Huffman with BWT, LZSS with BWT and Dictionary based Encoding (DBE) for Calgary corpus files Comparision of compression ratio Comparision ratio BIB GEO OBJ1 PAPER1 PAPER2 PAPER3 PAPER4 PAPER5 PAPER6 File Name PROGC PROGL PROGP arithmetic coding Huffman + BWT LZSS + BWT Dictionary based compression

6 708 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) Table.3 Comparison of Compression Ratio File Name arithmetic coding Huffman + BWT LZSS + BWT Dictionary based compression BIB GEO OBJ PAPER PAPER PAPER PAPER PAPER PAPER PROGC PROGL PROGP Example, a section of text from Calgary corpus paper 1 looks like this in the original text: Its performance is optimal without the need for blocking of input data. Its performance is optimal without the need for blocking of input data. Its performance is optimal without the need for blocking of input data. It encourages a clear separation between the model for representing data and the encoding of information with respect to that model. It accommodates adaptive models easily. It is computationally efficient. Number of characters required=420 Running this text through the dictionary based encoder yields the following text: C/(KÊBÕ!B:,BLÍ"B@C/(KÊBÕ!B:,BLÍ"B@C/(KÊBÕ!B:,BLÍ"B@AVk%CåOÂC-!»,K{A.&!Có" <K~$2DEËA BÅ(DEÊADw Number of characters required=94 Hiding the compressed text in audio will enhance the security. Compared to other text compression algorithm dictionary based audio steganography system gives better SNR (signal to noise Ratio) value. SNR=10 log 10{ n X 2 (n)/ n [X 2 (n)-y 2 (n)]} X (n) =Represents a sample of input audio sequence. Y (n) =Stands for a sample of audio with modified LSB.

7 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) Table.4 Comparison of SNR Cover file name Arithmetic coding Huffman coding Dictionary based compression News Notify Tada Windows XP windows Fig 3.Comparison of SNR Comparision of SNR SNR News2 notify Tada Windows XP windows Audio file name arithmetic coding Huffman coding Dictionary based compression 3. CONCLUSION This paper proposes a method of text transformation using Dictionary based encoding and audio steganography. In a channel, the reduction of transmission time is directly proportional to the amount of compression. If the input text is replaced by variable length codes with its length less than its average size, the size of input text can be reduced by using dictionary based compression. This proposed compression algorithm achieves good compression ratio, reduces bits per character. This audio Steganography is conducted for various compression algorithms with dictionary based compression. Audio Steganography based text compression achieves better SNR value. 4. REFERENCE [1].G.Hold and T.R Marshall, Data compression, John Wiley, New York [2]. Jirapond Tadrat and Veera Boonjing, 2008 An Experiment study on Transformation for Compression using stop lists and Frequent words IEEE Transactions on information technology. [3].Data compression: the complete reference By David Salomon [4].A.carus, A.Mesut, 2010, Fast text compression using Multiplies dictionaries, Information technology journal 9(5) [5]. M. Burrows and D. J. Wheeler. A Block-sorting Lossless Data Compression Algorithm, SRC Research Report 124, Digital Systems Research Center [6].Mohammed Pooyan,Ahmed Delforouzi.2007, LSB based steganography method based on lifting WaveletTransform,IEEE international symposium on signal processing and information technology. [7].R.Sridevi,DR.A.Damodaram,dr.SVL.Narasimham,2009, Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. [8].F.A.P.Petitcolas,R.J.Anderson,and M.G.Khun, Information Hiding A survey,proc.ieee,vol.87.7,1999,pp [9]. J.L. Bentley, D.D. Sleator, R.E. Tarjan, and V.K. Wei, A Locally Adaptive Data Compression Scheme, Proc. 22nd Allerton Conf. On Communication, Control, and Computing, pp , Monticello, IL, October 1984, University of Illinois [10]. J.L. Bentley, D.D. Sleator, R.E. Tarjan, and V.K. Wei, A Locally Adaptive Data Compression Scheme, Commun. Ass. Comp. Mach., 29:pp , April [11]. R.G. Gallager. Variations on a theme by Huffman, IEEE Trans. Information Theory, IT-24(6), pp , Nov, 1978 [12]. D.A.Huffman. A Method for the Construction of Minimum Redundancy Codes, Proc. IRE, 40(9), pp , 1952

8 710 M. Baritha Begum and Y.Venkataramani / Procedia Engineering 30 (2012) [13].Nelson C. Francisco, Nuno M. M. Rodrigues, Eduardo A. B. da Silva, Murilo Bresciani de Carvalho, Sergio M. M. de Faria,, October 2010 Scanned Compound Document Encoding Using Multiscale Recurrent Patterns IEEE transactions on image processing, vol. 19, no. 10. [14].Umesh S. Bhadade Prof. A.I. Trivedi, January 2011 Lossless Text Compression using Dictionaries, International Journal of Computer Applications ( ) Volume 13 No.8. [15]. corpus.canterbury.ac.nz/

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol., Issue, ISSN (online): - Modified Golomb Code for Integer Representation Nelson Raja Joseph Jaganathan P Domnic Sandanam Department

More information

THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS

THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS Yair Wiseman 1* * 1 Computer Science Department, Bar-Ilan University, Ramat-Gan 52900, Israel Email: wiseman@cs.huji.ac.il, http://www.cs.biu.ac.il/~wiseman

More information

A Fast Block sorting Algorithm for lossless Data Compression

A Fast Block sorting Algorithm for lossless Data Compression A Fast Block sorting Algorithm for lossless Data Compression DI Michael Schindler Vienna University of Technology Karlsplatz 13/1861, A 1040 Wien, Austria, Europe michael@eiunix.tuwien.ac.at if.at is transformed

More information

Data Compression Scheme of Dynamic Huffman Code for Different Languages

Data Compression Scheme of Dynamic Huffman Code for Different Languages 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Data Compression Scheme of Dynamic Huffman Code for Different Languages Shivani Pathak

More information

Experimental Evaluation of List Update Algorithms for Data Compression

Experimental Evaluation of List Update Algorithms for Data Compression Experimental Evaluation of List Update Algorithms for Data Compression Reza Dorrigiv 1, Alejandro López-Ortiz 1, and J. Ian Munro 1 Cheriton School of Computer Science, University of Waterloo, Waterloo,

More information

ADVANCED LOSSLESS TEXT COMPRESSION ALGORITHM BASED ON SPLAY TREE ADAPTIVE METHODS

ADVANCED LOSSLESS TEXT COMPRESSION ALGORITHM BASED ON SPLAY TREE ADAPTIVE METHODS ADVANCED LOSSLESS TEXT COMPRESSION ALGORITHM BASED ON SPLAY TREE ADAPTIVE METHODS RADU RĂDESCU, ANDREEA HONCIUC *1 Key words: Data compression, Splay Tree, Prefix, ratio. This paper presents an original

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Rashmi Gadbail,, 2013; Volume 1(8): 783-791 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK EFFECTIVE XML DATABASE COMPRESSION

More information

Information Technology Department, PCCOE-Pimpri Chinchwad, College of Engineering, Pune, Maharashtra, India 2

Information Technology Department, PCCOE-Pimpri Chinchwad, College of Engineering, Pune, Maharashtra, India 2 Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Adaptive Huffman

More information

An Asymmetric, Semi-adaptive Text Compression Algorithm

An Asymmetric, Semi-adaptive Text Compression Algorithm An Asymmetric, Semi-adaptive Text Compression Algorithm Harry Plantinga Department of Computer Science University of Pittsburgh Pittsburgh, PA 15260 planting@cs.pitt.edu Abstract A new heuristic for text

More information

A Research Paper on Lossless Data Compression Techniques

A Research Paper on Lossless Data Compression Techniques IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 1 June 2017 ISSN (online): 2349-6010 A Research Paper on Lossless Data Compression Techniques Prof. Dipti Mathpal

More information

An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security

An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Higher Compression from the Burrows-Wheeler Transform by

Higher Compression from the Burrows-Wheeler Transform by Higher Compression from the Burrows-Wheeler Transform by Modified Sorting Brenton Chapin Stephen R. Tate Dept. of Computer Science University of North Texas P. O. Box 311366 Denton, TX 76203 1366 Abstract

More information

A Novel Image Compression Technique using Simple Arithmetic Addition

A Novel Image Compression Technique using Simple Arithmetic Addition Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC A Novel Image Compression Technique using Simple Arithmetic Addition Nadeem Akhtar, Gufran Siddiqui and Salman

More information

A Comparative Study Of Text Compression Algorithms

A Comparative Study Of Text Compression Algorithms International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011 68 A Comparative Study Of Text Compression Algorithms Senthil Shanmugasundaram Department of Computer Science, Vidyasagar College

More information

Implementation and Optimization of LZW Compression Algorithm Based on Bridge Vibration Data

Implementation and Optimization of LZW Compression Algorithm Based on Bridge Vibration Data Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 1570 1574 Advanced in Control Engineeringand Information Science Implementation and Optimization of LZW Compression Algorithm Based

More information

Lossless Text Compression using Dictionaries

Lossless Text Compression using Dictionaries Lossless Text Compression using Dictionaries Umesh S. Bhadade G.H. Raisoni Institute of Engineering & Management Gat No. 57, Shirsoli Road Jalgaon (MS) India - 425001 ABSTRACT Compression is used just

More information

University of Mustansiriyah, Baghdad, Iraq

University of Mustansiriyah, Baghdad, Iraq Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression

More information

An On-line Variable Length Binary. Institute for Systems Research and. Institute for Advanced Computer Studies. University of Maryland

An On-line Variable Length Binary. Institute for Systems Research and. Institute for Advanced Computer Studies. University of Maryland An On-line Variable Length inary Encoding Tinku Acharya Joseph F. Ja Ja Institute for Systems Research and Institute for Advanced Computer Studies University of Maryland College Park, MD 242 facharya,

More information

A New Compression Method Strictly for English Textual Data

A New Compression Method Strictly for English Textual Data A New Compression Method Strictly for English Textual Data Sabina Priyadarshini Department of Computer Science and Engineering Birla Institute of Technology Abstract - Data compression is a requirement

More information

Keywords Data compression, Lossless data compression technique, Huffman Coding, Arithmetic coding etc.

Keywords Data compression, Lossless data compression technique, Huffman Coding, Arithmetic coding etc. Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Comparative

More information

Data Compression. Media Signal Processing, Presentation 2. Presented By: Jahanzeb Farooq Michael Osadebey

Data Compression. Media Signal Processing, Presentation 2. Presented By: Jahanzeb Farooq Michael Osadebey Data Compression Media Signal Processing, Presentation 2 Presented By: Jahanzeb Farooq Michael Osadebey What is Data Compression? Definition -Reducing the amount of data required to represent a source

More information

Comparative Study of Dictionary based Compression Algorithms on Text Data

Comparative Study of Dictionary based Compression Algorithms on Text Data 88 Comparative Study of Dictionary based Compression Algorithms on Text Data Amit Jain Kamaljit I. Lakhtaria Sir Padampat Singhania University, Udaipur (Raj.) 323601 India Abstract: With increasing amount

More information

HARDWARE IMPLEMENTATION OF LOSSLESS LZMA DATA COMPRESSION ALGORITHM

HARDWARE IMPLEMENTATION OF LOSSLESS LZMA DATA COMPRESSION ALGORITHM HARDWARE IMPLEMENTATION OF LOSSLESS LZMA DATA COMPRESSION ALGORITHM Parekar P. M. 1, Thakare S. S. 2 1,2 Department of Electronics and Telecommunication Engineering, Amravati University Government College

More information

Lossless Audio Coding based on Burrows Wheeler Transform and Run Length Encoding Algorithm

Lossless Audio Coding based on Burrows Wheeler Transform and Run Length Encoding Algorithm Lossless Audio Coding based on Burrows Wheeler Transform and Run Length Encoding Algorithm Pratibha Warkade 1, Agya Mishra 2 M.E. Scholar, Dept. of Electronics and Telecommunication Engineering, Jabalpur

More information

arxiv: v2 [cs.it] 15 Jan 2011

arxiv: v2 [cs.it] 15 Jan 2011 Improving PPM Algorithm Using Dictionaries Yichuan Hu Department of Electrical and Systems Engineering University of Pennsylvania Email: yichuan@seas.upenn.edu Jianzhong (Charlie) Zhang, Farooq Khan and

More information

IMAGE COMPRESSION TECHNIQUES

IMAGE COMPRESSION TECHNIQUES IMAGE COMPRESSION TECHNIQUES A.VASANTHAKUMARI, M.Sc., M.Phil., ASSISTANT PROFESSOR OF COMPUTER SCIENCE, JOSEPH ARTS AND SCIENCE COLLEGE, TIRUNAVALUR, VILLUPURAM (DT), TAMIL NADU, INDIA ABSTRACT A picture

More information

Lossless Compression Algorithms

Lossless Compression Algorithms Multimedia Data Compression Part I Chapter 7 Lossless Compression Algorithms 1 Chapter 7 Lossless Compression Algorithms 1. Introduction 2. Basics of Information Theory 3. Lossless Compression Algorithms

More information

Encoding. A thesis submitted to the Graduate School of University of Cincinnati in

Encoding. A thesis submitted to the Graduate School of University of Cincinnati in Lossless Data Compression for Security Purposes Using Huffman Encoding A thesis submitted to the Graduate School of University of Cincinnati in a partial fulfillment of requirements for the degree of Master

More information

Image Compression Algorithm and JPEG Standard

Image Compression Algorithm and JPEG Standard International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in

More information

Lossless compression II

Lossless compression II Lossless II D 44 R 52 B 81 C 84 D 86 R 82 A 85 A 87 A 83 R 88 A 8A B 89 A 8B Symbol Probability Range a 0.2 [0.0, 0.2) e 0.3 [0.2, 0.5) i 0.1 [0.5, 0.6) o 0.2 [0.6, 0.8) u 0.1 [0.8, 0.9)! 0.1 [0.9, 1.0)

More information

FPGA based Data Compression using Dictionary based LZW Algorithm

FPGA based Data Compression using Dictionary based LZW Algorithm FPGA based Data Compression using Dictionary based LZW Algorithm Samish Kamble PG Student, E & TC Department, D.Y. Patil College of Engineering, Kolhapur, India Prof. S B Patil Asso.Professor, E & TC Department,

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

STUDY OF VARIOUS DATA COMPRESSION TOOLS

STUDY OF VARIOUS DATA COMPRESSION TOOLS STUDY OF VARIOUS DATA COMPRESSION TOOLS Divya Singh [1], Vimal Bibhu [2], Abhishek Anand [3], Kamalesh Maity [4],Bhaskar Joshi [5] Senior Lecturer, Department of Computer Science and Engineering, AMITY

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

ISSN (ONLINE): , VOLUME-3, ISSUE-1, PERFORMANCE ANALYSIS OF LOSSLESS COMPRESSION TECHNIQUES TO INVESTIGATE THE OPTIMUM IMAGE COMPRESSION TECHNIQUE Dr. S. Swapna Rani Associate Professor, ECE Department M.V.S.R Engineering College, Nadergul,

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

A Memory-Efficient Adaptive Huffman Coding Algorithm for Very Large Sets of Symbols Revisited

A Memory-Efficient Adaptive Huffman Coding Algorithm for Very Large Sets of Symbols Revisited A Memory-Efficient Adaptive Huffman Coding Algorithm for Very Large Sets of Symbols Revisited Steven Pigeon Yoshua Bengio pigeon,bengioy}@iro.umontreal.ca Département d Informatique et de Recherche opérationelle

More information

Journal of Computer Engineering and Technology (IJCET), ISSN (Print), International Journal of Computer Engineering

Journal of Computer Engineering and Technology (IJCET), ISSN (Print), International Journal of Computer Engineering Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume

More information

Data Compression. Guest lecture, SGDS Fall 2011

Data Compression. Guest lecture, SGDS Fall 2011 Data Compression Guest lecture, SGDS Fall 2011 1 Basics Lossy/lossless Alphabet compaction Compression is impossible Compression is possible RLE Variable-length codes Undecidable Pigeon-holes Patterns

More information

Text Steganography Using Compression and Random Number Generators

Text Steganography Using Compression and Random Number Generators Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed

More information

Comparison of Text Data Compression Using Run Length Encoding, Arithmetic Encoding, Punctured Elias Code and Goldbach Code

Comparison of Text Data Compression Using Run Length Encoding, Arithmetic Encoding, Punctured Elias Code and Goldbach Code Comparison of Text Data Compression Using Run Length Encoding, Arithmetic Encoding, Punctured Elias Code and Goldbach Code Kenang Eko Prasetyo 1, Tito Waluyo Purboyo 2, Randy Erfa Saputra 3 Computer Engineering,

More information

LIPT-Derived Transform Methods Used in Lossless Compression of Text Files

LIPT-Derived Transform Methods Used in Lossless Compression of Text Files ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 14, Number 2, 2011, 149 158 LIPT-Derived Transform Methods Used in Lossless Compression of Text Files Radu RĂDESCU Politehnica University of

More information

A Comparative Study of Lossless Compression Algorithm on Text Data

A Comparative Study of Lossless Compression Algorithm on Text Data Proc. of Int. Conf. on Advances in Computer Science, AETACS A Comparative Study of Lossless Compression Algorithm on Text Data Amit Jain a * Kamaljit I. Lakhtaria b, Prateek Srivastava c a, b, c Department

More information

TEXT COMPRESSION ALGORITHMS - A COMPARATIVE STUDY

TEXT COMPRESSION ALGORITHMS - A COMPARATIVE STUDY S SENTHIL AND L ROBERT: TEXT COMPRESSION ALGORITHMS A COMPARATIVE STUDY DOI: 10.21917/ijct.2011.0062 TEXT COMPRESSION ALGORITHMS - A COMPARATIVE STUDY S. Senthil 1 and L. Robert 2 1 Department of Computer

More information

Using Shift Number Coding with Wavelet Transform for Image Compression

Using Shift Number Coding with Wavelet Transform for Image Compression ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 4, No. 3, 2009, pp. 311-320 Using Shift Number Coding with Wavelet Transform for Image Compression Mohammed Mustafa Siddeq

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

types of data require absolute reliability. Examples are an executable computer program, a legal text document, a medical X-ray image, and genetic

types of data require absolute reliability. Examples are an executable computer program, a legal text document, a medical X-ray image, and genetic It is virtually certain that a reader of this book is both a computer user and an Internet user, and thus the owner of digital data. More and more people all over the world generate, use, own, and enjoy

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

Enhanced LSB Based Audio Steganography

Enhanced LSB Based Audio Steganography Enhanced LSB Based Audio Steganography Prof.Dighe Mohit dighe.mohit@gmail.com Miss. Kavade Priyanka kavade.priyanka@gmail.com Mr. Raje Lakhan lakhan2030@gmail.com Miss.Harale prajakta harale.prajakta15@gmail.com

More information

A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - REVIEW

A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - REVIEW A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - ABSTRACT: REVIEW M.JEYAPRATHA 1, B.POORNA VENNILA 2 Department of Computer Application, Nadar Saraswathi College of Arts and Science, Theni, Tamil

More information

Iomega Automatic Backup Pro Software Delivers Impressive Compression Results

Iomega Automatic Backup Pro Software Delivers Impressive Compression Results Technical White Paper March 2004 Iomega Automatic Backup Pro Software Delivers Impressive Compression Results Iomega REV Drive Achieves up to 2.6:1 Data Compression with Bundled IAB Pro Software Introduction

More information

Volume 2, Issue 9, September 2014 ISSN

Volume 2, Issue 9, September 2014 ISSN Fingerprint Verification of the Digital Images by Using the Discrete Cosine Transformation, Run length Encoding, Fourier transformation and Correlation. Palvee Sharma 1, Dr. Rajeev Mahajan 2 1M.Tech Student

More information

EE-575 INFORMATION THEORY - SEM 092

EE-575 INFORMATION THEORY - SEM 092 EE-575 INFORMATION THEORY - SEM 092 Project Report on Lempel Ziv compression technique. Department of Electrical Engineering Prepared By: Mohammed Akber Ali Student ID # g200806120. ------------------------------------------------------------------------------------------------------------------------------------------

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -

More information

Data Representation. Types of data: Numbers Text Audio Images & Graphics Video

Data Representation. Types of data: Numbers Text Audio Images & Graphics Video Data Representation Data Representation Types of data: Numbers Text Audio Images & Graphics Video Analog vs Digital data How is data represented? What is a signal? Transmission of data Analog vs Digital

More information

A Comparative Study of Entropy Encoding Techniques for Lossless Text Data Compression

A Comparative Study of Entropy Encoding Techniques for Lossless Text Data Compression A Comparative Study of Entropy Encoding Techniques for Lossless Text Data Compression P. RATNA TEJASWI 1 P. DEEPTHI 2 V.PALLAVI 3 D. GOLDIE VAL DIVYA 4 Abstract: Data compression is the art of reducing

More information

A Comprehensive Review of Data Compression Techniques

A Comprehensive Review of Data Compression Techniques Volume-6, Issue-2, March-April 2016 International Journal of Engineering and Management Research Page Number: 684-688 A Comprehensive Review of Data Compression Techniques Palwinder Singh 1, Amarbir Singh

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Various audio Steganography techniques for audio signals Rubby Garg 1, Dr.Vijay Laxmi 2

Various audio Steganography techniques for audio signals Rubby Garg 1, Dr.Vijay Laxmi 2 www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 10 Oct. 2016, Page No. 18682-18693 Various audio Steganography techniques for audio signals Rubby Garg

More information

Dictionary-Based Fast Transform for Text Compression with High Compression Ratio

Dictionary-Based Fast Transform for Text Compression with High Compression Ratio Dictionary-Based Fast for Text Compression with High Compression Ratio Weifeng Sun Amar Mukherjee School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL. 32816

More information

Punctured Elias Codes for variable-length coding of the integers

Punctured Elias Codes for variable-length coding of the integers Punctured Elias Codes for variable-length coding of the integers Peter Fenwick Technical Report 137 ISSN 1173-3500 December 5, 1996 Department of Computer Science, The University of Auckland, Private Bag

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

A Compression Technique Based On Optimality Of LZW Code (OLZW)

A Compression Technique Based On Optimality Of LZW Code (OLZW) 2012 Third International Conference on Computer and Communication Technology A Compression Technique Based On Optimality Of LZW (OLZW) Utpal Nandi Dept. of Comp. Sc. & Engg. Academy Of Technology Hooghly-712121,West

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

Dictionary Based Text Filter for Lossless Text Compression

Dictionary Based Text Filter for Lossless Text Compression Dictionary Based Text for Lossless Text Compression Rexline S. J #1, Robert L *2, Trujilla Lobo.F #3 # Department of Computer Science, Loyola College, Chennai, India * Department of Computer Science Government

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression

On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression Artur J. Ferreira 1,3 Arlindo L. Oliveira 2,4 Mário A. T. Figueiredo 3,4 1 Instituto Superior de Engenharia de Lisboa, Lisboa, PORTUGAL

More information

Multimedia Networking ECE 599

Multimedia Networking ECE 599 Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on B. Lee s lecture notes. 1 Outline Compression basics Entropy and information theory basics

More information

Text Data Compression and Decompression Using Modified Deflate Algorithm

Text Data Compression and Decompression Using Modified Deflate Algorithm Text Data Compression and Decompression Using Modified Deflate Algorithm R. Karthik, V. Ramesh, M. Siva B.E. Department of Computer Science and Engineering, SBM COLLEGE OF ENGINEERING AND TECHNOLOGY, Dindigul-624005.

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

1. Introduction %$%&'() *+,(-

1. Introduction %$%&'() *+,(- ! "#$ %$%&'() *+,(- *./01# The lossless Burrows-Wheeler compression algorithm has received considerable attention over recent years for both its simplicity and effectiveness. It is based on a permutation

More information

So, what is data compression, and why do we need it?

So, what is data compression, and why do we need it? In the last decade we have been witnessing a revolution in the way we communicate 2 The major contributors in this revolution are: Internet; The explosive development of mobile communications; and The

More information

A SIMPLE LOSSLESS COMPRESSION ALGORITHM IN WIRELESS SENSOR NETWORKS: AN APPLICATION OF SEISMIC DATA

A SIMPLE LOSSLESS COMPRESSION ALGORITHM IN WIRELESS SENSOR NETWORKS: AN APPLICATION OF SEISMIC DATA ISSN: 0976-3104 ARTICLE A SIMPLE LOSSLESS COMPRESSION ALGORITHM IN WIRELESS SENSOR NETWORKS: AN APPLICATION OF SEISMIC DATA J. Uthayakumar 1*, T. Vengattaraman 1, J. Amudhavel 2 1 Department of Computer

More information

Design and Implementation of FPGA- based Systolic Array for LZ Data Compression

Design and Implementation of FPGA- based Systolic Array for LZ Data Compression Design and Implementation of FPGA- based Systolic Array for LZ Data Compression Mohamed A. Abd El ghany Electronics Dept. German University in Cairo Cairo, Egypt E-mail: mohamed.abdel-ghany@guc.edu.eg

More information

Analysis of Parallelization Effects on Textual Data Compression

Analysis of Parallelization Effects on Textual Data Compression Analysis of Parallelization Effects on Textual Data GORAN MARTINOVIC, CASLAV LIVADA, DRAGO ZAGAR Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Kneza Trpimira 2b, 31000

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Quad-Byte Transformation as a Pre-processing to Arithmetic Coding

Quad-Byte Transformation as a Pre-processing to Arithmetic Coding Quad-Byte Transformation as a Pre-processing to Arithmetic Coding Jyotika Doshi GLS Inst.of Computer Technology Opp. Law Garden, Ellisbridge Ahmedabad-380006, INDIA Savita Gandhi Dept. of Computer Science;

More information

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5

More information

CS 493: Algorithms for Massive Data Sets Dictionary-based compression February 14, 2002 Scribe: Tony Wirth LZ77

CS 493: Algorithms for Massive Data Sets Dictionary-based compression February 14, 2002 Scribe: Tony Wirth LZ77 CS 493: Algorithms for Massive Data Sets February 14, 2002 Dictionary-based compression Scribe: Tony Wirth This lecture will explore two adaptive dictionary compression schemes: LZ77 and LZ78. We use the

More information

Incremental Frequency Count A post BWT-stage for the Burrows-Wheeler Compression Algorithm

Incremental Frequency Count A post BWT-stage for the Burrows-Wheeler Compression Algorithm Incremental Frequency Count A post BWT-stage for the Burrows-Wheeler Compression Algorithm Jürgen Abel Ingenieurbüro Dr. Abel GmbH, Lechstrasse 1, 41469 Neuss Germany Telephon: +49 2137 999333 Email: juergen.abel@data-compression.info

More information

A study in compression algorithms

A study in compression algorithms Master Thesis Computer Science Thesis no: MCS-004:7 January 005 A study in compression algorithms Mattias Håkansson Sjöstrand Department of Interaction and System Design School of Engineering Blekinge

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

A NOVEL METHOD FOR HIDING INFORMATION

A NOVEL METHOD FOR HIDING INFORMATION A NOVEL METHOD FOR HIDING INFORMATION Samer Thaaban Abaas Al-Shibley Education College, Kufa University samir-alshebly@uokufa.edu.iq Abstract In this paper, we introduce a new method to hide information

More information

An Analysis of Various Techniques in Audio Steganography

An Analysis of Various Techniques in Audio Steganography An Analysis of Various Techniques in Audio Steganography B.Ramapriya 1, K.Bhuvanasundari 2, D.Bharathi 3 Assistant Professor, Dept. of Computer Science, Sri Akilandeswari Women s College, Wandiwash, Tamil

More information

Error Resilient LZ 77 Data Compression

Error Resilient LZ 77 Data Compression Error Resilient LZ 77 Data Compression Stefano Lonardi Wojciech Szpankowski Mark Daniel Ward Presentation by Peter Macko Motivation Lempel-Ziv 77 lacks any form of error correction Introducing a single

More information

Optimized Compression and Decompression Software

Optimized Compression and Decompression Software 2015 IJSRSET Volume 1 Issue 3 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Optimized Compression and Decompression Software Mohd Shafaat Hussain, Manoj Yadav

More information

More Bits and Bytes Huffman Coding

More Bits and Bytes Huffman Coding More Bits and Bytes Huffman Coding Encoding Text: How is it done? ASCII, UTF, Huffman algorithm ASCII C A T Lawrence Snyder, CSE UTF-8: All the alphabets in the world Uniform Transformation Format: a variable-width

More information

Steganography using MATLAB

Steganography using MATLAB ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant

More information

Steganography: A Security Model for Open Communication

Steganography: A Security Model for Open Communication Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology

More information

A SIMPLE DATA COMPRESSION ALGORITHM FOR ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS

A SIMPLE DATA COMPRESSION ALGORITHM FOR ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS Volume 117 No. 19 2017, 403-410 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SIMPLE DATA COMPRESSION ALGORITHM FOR ANOMALY DETECTION IN WIRELESS

More information

CHAPTER II LITERATURE REVIEW

CHAPTER II LITERATURE REVIEW CHAPTER II LITERATURE REVIEW 2.1 BACKGROUND OF THE STUDY The purpose of this chapter is to study and analyze famous lossless data compression algorithm, called LZW. The main objective of the study is to

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information